{"id":38266,"date":"2019-06-24T06:56:53","date_gmt":"2019-06-24T11:56:53","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=38266"},"modified":"2019-06-24T06:56:54","modified_gmt":"2019-06-24T11:56:54","slug":"wapo-hacked-documents-reveal-sensitive-details-of-expanding-border-surveillance","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=38266","title":{"rendered":"WaPo: Hacked documents reveal sensitive details of expanding border surveillance"},"content":{"rendered":"<p>WaPo: <a href=\"https:\/\/www.washingtonpost.com\/technology\/2019\/06\/21\/hacked-documents-reveal-sensitive-details-expanding-border-surveillance\/?utm_term=.e37186127265\">Hacked documents reveal sensitive details of expanding border surveillance<\/a> by Drew Harwell:<\/p>\n<blockquote><p>Far more information was taken in the hack of a Customs and Border Protection contractor than U.S. officials have acknowledged.<\/p><\/blockquote>\n<p><!--more--><\/p>\n<blockquote><p>The recent cyberattack on a U.S. Customs and Border Protection subcontractor didn\u2019t expose just the faces and license plates of thousands of U.S. travelers. It also revealed the inner workings of a complex surveillance network that border authorities have long sought to keep secret.<\/p>\n<p>CBP officials have downplayed the significance of the material taken in the hack, saying only that fewer than 100,000 photos of travelers had been compromised and that none of those had been posted to the \u201cdark Web,\u201d the corner of the Internet where stolen documents are often traded and displayed.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>WaPo: Hacked documents reveal sensitive details of expanding border surveillance by Drew Harwell: Far more information was taken in the hack of a Customs and Border Protection contractor than U.S. officials have acknowledged.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,76],"tags":[],"class_list":["post-38266","post","type-post","status-publish","format-standard","hentry","category-border-search","category-surveillance-technology"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/38266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=38266"}],"version-history":[{"count":1,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/38266\/revisions"}],"predecessor-version":[{"id":38267,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/38266\/revisions\/38267"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=38266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=38266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=38266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}